General
-
Target
781a5cdfef388bc98d537b65a3df756d
-
Size
376KB
-
Sample
231226-sk7yeabdbq
-
MD5
781a5cdfef388bc98d537b65a3df756d
-
SHA1
80fb0082c6e89c4c5b65b56e14f95ee7ff5bed42
-
SHA256
30a2f8a889552fa0206b73593d8a1b8dd7da3c0cf6d6376e8b9c0ab9cc7d082f
-
SHA512
919c6f089a121f20b691678b12e1828d6dd2a89c23c9235fe2f9ffaa6bad27885b282ce50372da2aa364756e502b280c1d3fc1671d3b147e3127d1eaad8ba737
-
SSDEEP
6144:6/KrgKzSIlj4JAi1TmKGdvHDA5Ko6hhhuvxoXIuIvDmstILvSFQ2WTusng:GKrgKzSgjdQyKGdHDA5YhTuvYEDxgKFv
Static task
static1
Behavioral task
behavioral1
Sample
781a5cdfef388bc98d537b65a3df756d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
781a5cdfef388bc98d537b65a3df756d.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
fickerstealer
daymong.ru:80
Targets
-
-
Target
781a5cdfef388bc98d537b65a3df756d
-
Size
376KB
-
MD5
781a5cdfef388bc98d537b65a3df756d
-
SHA1
80fb0082c6e89c4c5b65b56e14f95ee7ff5bed42
-
SHA256
30a2f8a889552fa0206b73593d8a1b8dd7da3c0cf6d6376e8b9c0ab9cc7d082f
-
SHA512
919c6f089a121f20b691678b12e1828d6dd2a89c23c9235fe2f9ffaa6bad27885b282ce50372da2aa364756e502b280c1d3fc1671d3b147e3127d1eaad8ba737
-
SSDEEP
6144:6/KrgKzSIlj4JAi1TmKGdvHDA5Ko6hhhuvxoXIuIvDmstILvSFQ2WTusng:GKrgKzSgjdQyKGdHDA5YhTuvYEDxgKFv
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-